• Other
Contact

Contact

Revised DateComment
28.02.2025Updated contact information. Added e-mail

I’m usually available for a chat. Just scan the QR code below if you are using Whatsapp. Quick note: I won’t accept voice or video calls without prior notification. Please keep in mind, don’t just say hi - state your question at the very start!

Whatsapp Whatsapp

Other

MediaUsername / link
E-mailcontact@predefender.com
BlueSkyrjohnsen.bsky.social
LinkedInPublic profile
Mastodon@rjohnsen

  • Fundamentals
    • 1. - Basics
      • Definition
      • Hierarchy of Needs
      • Analyst Mindset
      • The Threathunter Persona
      • How to Start a Threat Hunting Program
      • Planning a Threat Hunt
      • Creating Hypothesis
      • When to Engage Threat Hunters
    • 2. - Frameworks
      • Diamond Model
      • Lockheed Martin Killchain
      • Unified Kill Chain
      • MITRE ATT&CK
      • OODA Loop
      • Pyramid of Pain
      • Threathunting Frameworks
        • Peak
        • TaHiTI
        • Magma
    • 3. - Methodology
      • Anomaly Driven
      • Intelligence Driven
      • Hypothesis Driven
    • 4. - Delivieries
      • Process Documentation
        • Runbook
        • Playbook
        • SOP
      • Sitrep
      • No Result Hunts
  • Lab
    • Setting Up a Basic Lab
    • Setting up a complete lab
    • API Bulk Ingesting Logs
    • Ingesting Windows Logs
    • Ingesting with Filebeat
  • Techniques
    • Understanding Data
    • Establishing Timeline
  • Tips and tricks
    • Intelligence Resources
    • MITRE ATT&CK Field Notes
      • T1105 - Ingress Tool Transfer
      • T1566 - Phishing
    • Siem Query Languages
    • Windows Logins
  • Cheat Sheets
    • IP Protocol Numbers
    • Kusto Sentinel Tables
    • Network Services
    • Powershell
    • Sysmon
    • Windows Registry
  • Release Plan
  • About
    • About
    • Faq
    • Contact

  •  
  •  
  •  

Copyright Roger Johnsen

All rights reserved.